1 # options to use when starting oidentd as daemon:
2 # -m lookup masquaraded connections in /etc/oidentd_masq.users
3 # -f forward requests for masquaraded connections to real host
4 # -q don't log connections to oidentd
5 # -P allow forwarded connectsions from this host. We use our own
6 # hostname here, since connections will be forwarded from oidentd
7 # on the vserver host. Those connections will appear to originate
8 # from our own (and only) IP address.
9 # see oidentd(8) for detailed list
10 OIDENT_OPTIONS="-mf -P `hostname`"
16 # Allow the default router to act as an oidentd proxy? (yes/no)
17 # Since the vserver stuff messes up this autodetection, we pass in -P
19 OIDENT_BEHIND_PROXY=no